Entry Mano:2008:RRI from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Mano:2008:RRI,
author = "Chad D. Mano and Andrew Blaich and Qi Liao and Yingxin
Jiang and David A. Cieslak and David C. Salyers and
Aaron Striegel",
title = "{RIPPS}: {Rogue Identifying Packet Payload Slicer
Detecting Unauthorized Wireless Hosts Through Network
Traffic Conditioning}",
journal = j-TISSEC,
volume = "11",
number = "2",
pages = "2:1--2:??",
month = mar,
year = "2008",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/1330332.1330334",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Jun 12 17:52:41 MDT 2008",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Wireless network access has become an integral part of
computing both at home and at the workplace. The
convenience of wireless network access at work may be
extremely beneficial to employees, but can be a burden
to network security personnel. This burden is magnified
by the threat of inexpensive wireless access points
being installed in a network without the knowledge of
network administrators. These devices, termed
{$<$}it{$>$}Rogue Wireless Access Points{$<$}/it{$>$},
may allow a malicious outsider to access valuable
network resources, including confidential communication
and other stored data. For this reason, wireless
connectivity detection is an essential capability, but
remains a difficult problem. We present a method of
detecting wireless hosts using a local RTT metric and a
novel packet payload slicing technique. The local RTT
metric provides the means to identify physical
transmission media while packet payload slicing
conditions network traffic to enhance the accuracy of
the detections. Most importantly, the packet payload
slicing method is transparent to both clients and
servers and does not require direct communication
between the monitoring system and monitored hosts.",
acknowledgement = ack-nhfb,
articleno = "2",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "network security; rogue systems; traffic
conditioning",
}
Related entries
- $>$,
11(2)1,
11(2)6
- $<$,
11(2)1,
11(2)6
- /it,
11(2)1,
11(2)6
- accuracy,
2(3)295,
12(1)4,
12(2)13,
12(3)17,
13(4)35,
13(4)38,
15(2)7,
15(3)12,
15(4)17,
17(3)12,
18(4)12
- administrator,
2(1)34,
2(2)177,
11(3)16,
13(1)10,
14(1)2
- allow,
2(4)390,
9(2)181,
10(3)10,
10(4)2,
10(4)3,
11(1)2,
11(2)4,
12(1)3,
12(1)6,
12(2)8,
12(2)10,
12(3)16,
12(3)18,
12(3)19,
13(3)21,
13(4)34,
13(4)38,
13(4)39,
13(4)41,
14(1)3,
14(1)5,
14(1)10,
14(3)25,
14(3)26,
14(3)27,
14(4)28,
14(4)29,
15(2)6,
15(2)9,
15(2)10,
16(1)3,
16(2)5,
16(3)9,
16(4)13,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)16,
18(3)10
- become,
11(3)14,
12(3)14,
12(4)21,
13(4)36,
14(1)3,
14(3)25,
15(1)4,
16(2)7,
17(2)6,
17(4)15,
18(1)2
- being,
9(4)421,
10(4)3,
11(3)14,
11(3)15,
12(2)12,
12(3)17,
13(4)35,
14(4)32,
16(2)6,
18(1)1,
18(2)5
- both,
1(1)26,
1(1)93,
2(1)65,
2(4)416,
9(2)181,
10(1)4,
10(3)12,
11(1)3,
11(1)4,
11(3)14,
11(3)15,
11(3)16,
11(4)22,
12(1)2,
12(2)13,
12(3)15,
12(4)20,
13(4)30,
13(4)33,
14(3)24,
15(1)5,
15(2)10,
15(3)11,
15(3)13,
16(1)4,
16(2)5,
16(3)10,
16(4)17,
17(3)9,
18(1)1,
18(4)13,
18(4)14
- burden,
12(4)21
- capability,
10(1)4,
10(4)2,
11(1)3,
11(3)14,
16(2)7,
16(4)13,
17(2)7,
17(3)9,
17(3)10
- client,
2(3)230,
2(4)390,
10(2)8,
10(4)4,
11(3)16,
12(3)14,
12(3)16,
13(4)30,
14(1)12,
14(3)27,
14(4)32,
16(2)5,
16(3)11,
16(3)12,
16(4)13,
17(2)5,
17(4)15
- communication,
4(3)289,
4(4)371,
7(4)523,
10(3)9,
10(4)6,
11(1)2,
11(2)3,
11(3)14,
11(4)18,
12(1)2,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(1)8,
13(4)29,
14(1)4,
14(1)12,
15(1)5,
15(2)6,
15(2)7,
15(2)9,
15(3)14,
16(3)10,
16(4)15,
17(1)4,
17(3)9,
18(2)5,
18(2)7
- computing,
1(1)3,
1(1)66,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(4)354,
2(4)390,
10(4)3,
11(1)3,
12(1)6,
12(2)8,
12(3)15,
13(3)25,
16(3)11,
18(3)11
- condition,
1(1)26,
2(3)295,
10(4)1,
11(1)3,
11(4)21,
12(2)11,
13(3)26,
16(1)3,
17(1)2,
18(1)2,
18(2)5,
18(2)6
- confidential,
12(3)17,
12(4)22
- connectivity,
11(2)1,
11(3)13
- convenience,
2(1)105,
14(1)8
- detecting,
4(1)1,
11(3)12,
11(4)19,
14(1)2,
14(2)21,
15(3)11,
16(2)5
- detection,
2(2)159,
2(3)295,
3(1)1,
3(3)186,
3(4)227,
3(4)262,
4(4)407,
5(3)203,
6(2)173,
6(4)443,
7(4)591,
9(1)61,
10(1)4,
11(3)12,
11(3)15,
11(4)19,
11(4)20,
12(2)11,
12(2)12,
12(2)13,
12(4)22,
13(2)12,
13(4)30,
14(1)13,
14(3)27,
15(2)6,
15(3)11,
15(4)17,
17(4)13,
17(4)15,
18(1)2,
18(2)7,
18(3)9
- device,
2(3)230,
10(4)3,
10(4)4,
11(3)14,
12(3)15,
13(4)30,
14(1)7,
15(1)4,
15(2)7,
16(2)6,
16(3)10,
17(3)10,
17(4)14,
17(4)16,
18(2)7
- difficult,
11(2)5,
11(3)15,
11(3)16,
13(3)28,
16(2)5,
17(1)4,
17(3)12,
17(4)16,
18(3)9,
18(4)13
- do,
2(3)230,
2(3)269,
9(4)421,
10(4)1,
11(1)4,
11(4)19,
12(1)3,
12(2)10,
13(2)13,
13(4)33,
13(4)35,
14(3)23,
14(3)27,
14(4)28,
16(1)1,
16(3)12,
16(4)13,
17(1)1,
18(3)9
- employees,
18(3)9
- enhance,
2(3)230,
9(4)391,
10(1)2,
12(2)8
- essential,
10(4)1,
10(4)2,
13(4)32,
13(4)34,
15(3)14,
18(1)2,
18(2)5
- extremely,
11(3)15,
12(4)21,
16(4)14
- has,
1(1)93,
2(1)105,
2(2)138,
2(3)230,
2(3)269,
2(3)332,
9(4)391,
10(1)3,
10(1)4,
10(3)10,
11(1)2,
11(3)14,
11(4)17,
11(4)19,
11(4)22,
11(4)23,
12(1)2,
12(2)9,
12(2)10,
12(3)15,
12(4)22,
13(3)20,
13(3)25,
13(3)26,
13(3)27,
13(3)28,
13(4)36,
14(1)3,
14(1)12,
14(1)14,
14(3)26,
14(4)28,
15(1)2,
15(2)6,
15(2)10,
15(3)12,
16(2)8,
16(4)14,
17(1)2,
17(1)3,
17(3)9,
17(3)11,
17(4)14,
17(4)15,
17(4)16,
18(2)7,
18(3)11,
18(4)14
- host,
2(2)177,
11(3)16,
12(2)12,
12(3)14,
13(4)38,
15(2)6,
15(4)16,
15(4)17
- identify,
11(3)12,
11(3)15,
11(3)16,
11(4)18,
11(4)20,
12(1)4,
12(4)20,
12(4)22,
13(4)35,
14(1)13,
15(4)18,
16(2)7,
17(4)13,
18(4)13
- identifying,
10(4)2,
11(3)12,
13(4)30,
15(2)6,
15(2)7,
15(3)14,
17(3)12
- importantly,
9(4)421
- including,
2(2)177,
2(3)295,
10(2)6,
10(3)11,
10(4)1,
11(3)14,
11(4)20,
11(4)22,
12(2)12,
12(3)14,
12(3)19,
13(4)32,
14(1)13,
15(2)6,
15(3)12,
16(2)5,
16(2)7,
16(4)17,
18(1)1,
18(1)4
- inexpensive,
2(4)416
- integral,
15(2)9
- knowledge,
10(3)12,
11(3)15,
12(1)3,
12(1)4,
12(2)11,
13(4)35,
15(3)14,
17(1)2,
17(3)9,
18(4)12
- local,
2(1)34,
2(3)269,
12(1)4,
12(3)17,
14(3)25,
14(4)31,
18(2)6,
18(2)8,
18(4)12
- malicious,
2(2)177,
2(3)295,
10(3)11,
10(4)6,
11(3)13,
11(3)14,
11(3)15,
11(4)22,
11(4)23,
12(2)12,
12(3)14,
14(1)13,
15(1)2,
15(4)17,
16(2)6,
16(3)12,
16(4)13,
16(4)14,
17(3)10,
17(3)12,
17(4)13,
18(2)5
- may,
2(2)138,
2(2)177,
9(4)391,
10(3)12,
10(4)2,
11(2)5,
11(3)12,
11(4)18,
11(4)21,
12(1)5,
12(2)8,
12(3)15,
12(3)16,
13(1)10,
13(3)22,
13(3)25,
13(4)35,
13(4)38,
13(4)40,
15(2)10,
16(1)4,
17(1)2,
17(1)4,
18(1)1,
18(2)5
- mean,
1(1)26,
2(1)34,
2(3)230,
10(3)10,
12(4)22,
14(1)5,
14(3)27,
15(3)12,
16(2)8,
18(4)14
- method,
1(1)3,
1(1)26,
2(2)159,
2(3)295,
2(3)332,
2(4)416,
9(3)259,
10(1)3,
10(3)10,
10(4)4,
10(4)5,
11(3)16,
11(4)19,
11(4)22,
12(1)2,
12(1)6,
12(2)13,
12(3)16,
13(2)15,
13(4)35,
15(1)4,
15(2)10,
15(3)12,
15(4)15,
15(4)17,
17(3)12,
18(3)9
- metric,
2(2)138,
2(3)295,
10(4)6,
15(2)10,
18(3)11
- monitored,
18(3)9
- monitoring,
12(2)13,
12(3)19,
13(2)12,
13(4)38,
14(1)13,
15(2)10,
16(1)3,
16(2)7,
16(4)14
- most,
2(3)332,
9(4)391,
11(3)12,
11(4)22,
12(2)8,
12(2)12,
12(3)14,
12(4)21,
13(1)10,
13(3)27,
13(4)30,
14(3)27,
15(1)5,
15(2)6,
15(4)15,
15(4)18,
16(1)4,
16(2)6,
16(4)13,
16(4)14,
17(3)11,
17(3)12,
17(4)16,
18(1)1
- not,
1(1)26,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(4)390,
9(4)421,
10(1)3,
10(4)2,
11(1)3,
11(1)4,
11(2)4,
11(2)5,
11(3)12,
11(3)13,
11(3)15,
11(3)16,
11(4)19,
11(4)20,
11(4)22,
12(1)1,
12(1)2,
12(1)3,
12(1)6,
12(2)10,
12(2)11,
12(2)13,
12(3)14,
12(4)22,
13(1)10,
13(3)28,
13(4)33,
13(4)35,
13(4)36,
13(4)37,
13(4)39,
13(4)40,
14(3)23,
14(3)27,
14(4)28,
14(4)29,
14(4)31,
15(2)6,
15(2)9,
15(2)10,
15(3)12,
15(3)13,
16(1)1,
16(2)5,
16(2)6,
16(3)9,
16(3)12,
16(4)13,
16(4)15,
16(4)16,
17(1)2,
17(3)10,
17(4)15,
18(1)1,
18(3)9,
18(4)13
- novel,
2(3)269,
9(4)461,
10(1)4,
10(3)12,
11(1)2,
11(1)3,
11(4)18,
11(4)19,
12(1)4,
12(3)16,
14(1)5,
15(1)4,
16(1)1,
16(4)16,
17(1)2,
17(3)9,
17(4)14,
18(1)4,
18(4)12
- other,
1(1)93,
2(4)354,
9(4)461,
10(3)9,
10(3)10,
10(3)11,
10(3)12,
10(4)1,
10(4)5,
11(2)6,
11(3)15,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)10,
12(3)14,
12(3)17,
12(4)22,
13(3)24,
13(3)25,
13(4)40,
14(3)23,
14(3)27,
14(4)30,
15(1)5,
15(2)6,
15(3)11,
15(3)14,
15(4)15,
16(4)15,
17(2)8,
17(3)9,
18(1)1,
18(1)3,
18(2)6,
18(4)12
- packet,
2(3)269,
7(2)319,
11(3)15,
12(2)10,
12(2)11,
12(2)13,
12(4)22,
13(4)35,
14(1)5,
14(1)7,
15(2)6,
15(4)16
- part,
2(3)332,
10(3)9,
10(4)4,
11(4)20,
12(1)1,
13(1)10,
15(2)8,
15(2)9,
16(4)15,
17(2)6,
17(4)16
- payload,
12(2)11,
13(2)15
- personnel,
11(4)20
- physical,
10(1)2,
10(4)3,
11(3)12,
11(3)14,
11(4)22,
14(2)16,
15(2)7,
17(4)13,
17(4)16
- point,
9(4)421,
11(1)3,
11(4)20,
12(1)6,
14(1)3,
14(4)30,
16(4)17
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(3)295,
2(4)354,
7(2)319,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)3,
11(1)2,
11(1)4,
11(2)5,
11(3)14,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)16,
15(4)18,
16(2)6,
16(2)7,
16(4)13,
16(4)14,
17(1)4,
17(2)6,
17(2)7,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(1)4,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- problem,
1(1)3,
2(3)269,
2(3)295,
5(3)238,
9(2)162,
9(4)391,
10(2)5,
10(2)8,
10(3)9,
10(3)10,
10(3)12,
10(4)1,
10(4)3,
11(3)12,
11(3)15,
11(4)19,
12(1)2,
12(1)6,
12(2)9,
12(3)18,
12(4)20,
13(3)22,
13(3)26,
13(3)27,
13(4)33,
13(4)36,
13(4)40,
14(3)25,
14(4)31,
15(4)15,
15(4)18,
16(1)3,
16(1)4,
16(3)11,
16(4)15,
17(2)8,
17(3)11,
17(4)15,
18(1)3
- provide,
1(1)3,
1(1)93,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(3)230,
2(4)390,
7(2)319,
10(1)3,
10(2)8,
10(3)10,
10(4)2,
10(4)6,
11(1)3,
11(1)4,
11(3)12,
11(3)13,
11(4)17,
11(4)20,
11(4)23,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)15,
12(3)16,
12(4)22,
13(3)22,
13(3)24,
13(4)31,
13(4)34,
13(4)38,
13(4)41,
14(1)4,
14(1)7,
14(1)8,
14(3)25,
14(4)28,
15(2)6,
15(2)10,
15(4)17,
15(4)18,
16(1)3,
16(2)5,
16(3)9,
16(3)11,
16(4)17,
17(2)5,
17(3)11,
17(3)12,
17(4)16,
18(1)1,
18(1)2,
18(2)5,
18(2)7,
18(4)13,
18(4)14
- reason,
10(3)12,
11(4)21,
12(1)1,
12(2)10,
16(1)3,
18(2)8
- remain,
2(4)416,
11(2)3,
13(4)41,
16(1)4
- require,
2(3)269,
10(1)2,
11(1)3,
11(4)22,
12(1)3,
12(1)6,
12(3)16,
12(4)20,
13(3)20,
13(3)21,
13(4)29,
13(4)33,
13(4)35,
13(4)40,
14(1)2,
14(3)27,
15(2)6,
15(4)16,
16(4)13,
17(2)5,
17(3)9,
17(3)10,
17(4)16,
18(1)2,
18(4)13
- resource,
2(3)332,
9(4)391,
10(4)4,
11(1)2,
11(1)3,
11(1)4,
11(3)14,
11(4)19,
11(4)20,
12(1)1,
12(1)6,
12(4)22,
13(3)20,
14(1)7,
14(1)10,
15(4)18,
17(1)2,
17(3)9,
18(2)6
- server,
1(1)66,
2(1)34,
2(3)230,
2(4)390,
10(4)4,
11(2)5,
11(3)14,
12(2)10,
12(3)14,
12(3)16,
12(3)17,
12(4)21,
14(1)3,
14(1)12,
14(4)29,
16(4)13,
16(4)15,
17(2)5,
17(4)15,
18(1)1
- stored,
12(3)16,
12(3)18,
13(3)22,
13(4)30,
14(1)12,
17(4)15
- technique,
1(1)3,
2(2)138,
2(3)230,
2(3)295,
2(4)416,
7(2)274,
9(4)391,
9(4)461,
10(2)6,
10(3)9,
10(4)6,
11(3)12,
11(3)16,
11(4)17,
11(4)18,
11(4)22,
12(1)4,
12(2)11,
12(2)13,
12(3)16,
12(3)18,
13(3)22,
13(3)25,
13(3)28,
13(4)32,
13(4)33,
13(4)35,
13(4)36,
13(4)39,
14(1)3,
14(1)5,
14(1)6,
14(1)13,
14(3)24,
14(4)32,
15(1)2,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(4)17,
15(4)18,
16(1)2,
16(2)6,
16(2)7,
16(3)11,
16(4)13,
16(4)14,
17(3)9,
17(3)12,
17(4)16,
18(1)2,
18(2)6,
18(3)11
- threat,
7(4)489,
10(3)11,
11(2)3,
12(2)12,
14(1)7,
14(3)24,
15(1)2,
15(2)7,
16(2)6,
16(2)8,
16(3)9,
17(4)16,
18(2)5,
18(2)7,
18(4)12,
18(4)14
- through,
5(4)367,
6(1)1,
9(2)162,
10(3)12,
10(4)2,
10(4)6,
11(3)12,
11(4)22,
11(4)23,
12(2)8,
12(2)13,
13(2)12,
13(3)25,
14(1)13,
15(3)12,
15(4)16,
16(2)5,
16(2)7,
16(3)9,
17(4)14,
18(1)2,
18(2)7,
18(3)11
- traffic,
2(3)269,
10(2)8,
11(2)3,
11(3)14,
12(2)13,
12(4)22,
15(2)6,
15(4)16,
17(1)4
- transmission,
1(1)26,
9(4)461,
12(3)15,
14(1)13
- transparent,
18(3)11
- unauthorized,
2(3)269,
2(4)354,
13(3)28,
15(2)7
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
10(4)6,
11(1)2,
11(2)1,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)15,
15(4)17,
16(1)1,
16(1)2,
16(1)4,
16(2)5,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- valuable,
10(1)3,
17(3)11
- while,
2(3)230,
2(4)354,
9(4)391,
9(4)421,
9(4)461,
10(2)5,
10(4)2,
11(1)4,
11(2)6,
11(4)18,
11(4)19,
11(4)22,
12(2)9,
12(3)16,
13(1)5,
13(3)22,
13(3)25,
13(4)39,
13(4)41,
14(3)25,
14(3)26,
14(4)31,
15(3)12,
15(4)15,
15(4)17,
16(3)9,
16(3)12,
16(4)16,
17(1)4,
17(3)9,
17(4)15,
18(1)1,
18(2)7
- wireless,
7(2)319,
8(2)228,
9(2)162,
10(4)6,
11(2)1,
11(3)12,
11(3)13,
11(3)14,
11(4)19,
11(4)22,
11(4)23,
14(1)5,
14(1)7,
17(2)5
- work,
2(2)138,
2(3)269,
2(4)416,
10(3)10,
10(4)6,
11(2)3,
11(3)15,
11(4)17,
11(4)19,
12(2)10,
12(2)11,
12(2)12,
12(3)16,
12(3)17,
12(3)18,
13(3)25,
13(4)38,
14(1)2,
14(1)14,
15(2)7,
15(2)10,
15(3)12,
15(4)15,
15(4)17,
16(1)3,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)13,
16(4)15,
17(3)12,
18(2)6,
18(4)13